• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

Help required to solve two drag and drop questions

 
Greenhorn
Posts: 3
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
help required to solve two drag and drop questions

Question 1:
----------------------------------------------------------
1) Verification of identity --->
2) presenting of false identity --->
3) impeding legitimate use --->
4) protection of backup tapes --->
5) improperly altering data --->


choices
A Spoofing
B Authentication
C Denial of services
D physical security
E Tampering

We need to match 1,2,3.. to A,b,c..
-----------------------------------------------------------
Answer :1 i am thinking
1-B
2-A
3-C
4-D
5-E





Question 2:
----------------------------------------------------------
1) Used for bulk encryption of data in an established channel --->
2) Encapsulate protocol negotiation , key exchange , and communication --->
3) Establish secure communication with previous unknown parties --->
4) Can attest to a principle having been associated with data --->



choices
A Digital Signature
B SSL
C Asymmetric Encryption
D Symmetric Encryption


We need to match 1,2,3.. to A,b,c..
-----------------------------------------------------------
Answer :2 i am thinking
1-A
2-B
3-C
4-D

pl send your comment /answers
 
Greenhorn
Posts: 2
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
I believe for Question 2, the correct answers sequence should be
1-D, "symmetric encryption" is suitable for "bulk encryption"
2-B, "protocol" mentioned is "SSL"
3-C, "asymmetric encryption" used when "unknown parties" are involved
4-A, "digital signature" can attest to this
 
Greenhorn
Posts: 21
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Question 1: Your answers seem to be correct.

Question 2:
1-D : Symmetric encryption could be used for data exchange after initial asymmetric key exchange, see explanation here : http://www.suse.de/~garloff/Writings/mutt_gpg/node3.html
2-B
3-C
4-A : Digital signature : message digest generated using hash algorithm (for example SHA-256) is encrypted with user private key and attached to the message. The receiver of the message will be able to decrypt this digital signature using sender public key. If he succeeded, it means, that the signature was indeed generated by a sender. Then he can generate the hash from the message and compare it with the original hash value (decrypted in previous step). If they match, it means, that the message was not changed during transmission and it was send by a sender.
Digest value is used here because asymmetric encryption is expensive and operating on short hash values instead of the whole message is much quicker.

Regards,

Pawel Piwowar
 
Ranch Hand
Posts: 325
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Quick Question, in which mock exam did you get these questions ?
 
dinesh garg
Greenhorn
Posts: 3
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
i saw these questions orkut community .. i had some doubt that why i asked here ....in coderanch the palace where where so many java developer visits
 
Consider Paul's rocket mass heater.
reply
    Bookmark Topic Watch Topic
  • New Topic